SlideShare a Scribd company logo
1 of 16
• Biometrics is the measurement and analysis of a person’s
measurable personal traits or characteristics.
• After measurement, this information can be used to
authenticate a person. This can also be used for other type of
measurements.
• The authentication system authenticates your identity and
verifies if you are the person you say you are. It, according to
the result, allows or denies access to the system.
• To make sure that a person is who he says he is, we take a
sample of the physical structure of the person and compare it
with the sample or record present in our database.
• Before comparison, a sign-up process is done, where a person
gives his biometric sample that is used later to compare and
authenticate a user, at the time of authentication.
• The sample at the time of sign-up is saved into the database of
the system. When the given sample matches the samples
existing in the database, user is authenticated and access is
given. And when the given sample does not match the
existing record the user is denied access to the system. This
process usually takes 2-3 seconds.
• In modern approach, Biometric characteristics
can be divided in two main classes:
– Physiological are related to the shape of the body and
thus it varies from person to person
Fingerprints, Face recognition, hand geometry and
iris recognition are some examples of this type of
Biometric.
– Behavioural are related to the behavior of a person.
Some examples in this case are signature, keystroke
dynamics and of voice . Sometimes voice is also
considered to be a physiological biometric as it varies
from person to person.
• Connect an apparatus to the computer and it scans the finger of a
person and authenticates identity of an individual. If it authenticates
the person, it will give the person the access to enter the system.
And if it doesn’t authenticate, you are not given access to the
system. Fingerprints vary from person to person.
• The have some special characteristics that make them different from
the finger print of other person. The fingerprints of a person remain
unchanged throughout life, except in case of some injury or damage.
• Fingerprint scanning can be done in a number of ways. There are
some systems that scan the distinct patterns on finger.
• Fingerprint systems should be cleaned regularly as dust may affect
the reading and the system may not be able to authenticate the user.
• The eye contains a certain structure surrounding the
pupil which is known as iris.
• Iris varies from person to person and two irises can
never be identical.
• Even the left and right eye irises are different from each
other. Here the user is asked to stand couple of inches of
inches away from the iris scanner, keeping eye in a
certain position
• Iris Scan is a bigger and expensive system, but is very
accurate.
• Hand geometry is basically the analysis and measuring
of both hands and fingers. The user is required to place
its hand at the hand-scanner with the fingers in proper
position as they were at the time of sign-up. A 32
thousand pixel digital camera is used to measure the
thickness, length and width of the hands and fingers.
There are many different types of hand devices available
in the market.
• Facial scan is done using the specific characteristics of a human’s
face.
• A camera is used to capture the features of a person. It doesn’t
compare the whole face’s data with the whole face. Instead
compares it from certain parts of the face to the person’s face during
the scan.
• Only parts like upper outlines of the eye socket or sides of mouth
are matched because these parts are difficult to change with plastic
surgery. So it doesn’t matter if the person loses little weight. This
technology works great at 320x240 resolutions and 3, 5 frames per
second.
• The voices of people vary from one to another. This fact
was used when devising voice scan technology. The voice
of a user is recorded using a microphone reading device.
And the system is able to recognize the voice later
because of the special characteristics of human voice. It is
important that the circumstances at the time of recording
and authenticating are same. Things like background
noise and equipment’s quality might influence the
system. The best part of using this technique is that it
requires no expensive equipment.
• This technique uses a special pen and tablet to capture
the way user signs its name. As much as the signature is
important there are other features that are considered
important. It measures when a user’s put the pen on the
tablet and when he removes it, the pressure on the
table, the speed by which he signs etc. This technique is
considered to be very accurate. And by using this
technique less people will object to this type of
authentication.
• Biometrics is an emerging technology. Less number of people must
have used security systems that combine with biometrics
techniques. This is because there is very little number of vendors
that manufacture these specialized products. And so the prices are
very high too. But as more people will get aware of these
techniques, the prices will definitely come down. As user acceptance
increases, more people will use these techniques in their everyday
lives.
• Access control
• Identity verification
• Law enforcement
• User acceptability
– User acceptability is one of the major issues faced by biometrics for various reasons. Most of
the people think that biometric techniques are an intrusion to their personal life. They are
concerned that in what ways this information can be used in the future. It might be possible
that government keeps track of such information without the users consent. Some might get
medical information from these samples. Iris and retina scans may indicate use of drugs. It is
certainly not the purpose of the systems detecting information. But the information might
fall in wrong hands. There is a possibility that certain contagious diseases might spread if
everybody use the same scanner.
• Technical problems
– Cost and accuracy are two major technical problems. In most of the cases, we will need new
hardware, software etc. to use a biometric technique. Cost depends on the type of technique
we are using. Iris scanner is a lot more expensive than finger print scanner. Finger print
scanners are very affordable. With time these techniques will become cheaper and more
efficient.
• Intrinsic problems
– Any trait can be stolen. Voices may be recorded and used anywhere. Once the biometrics is
stolen there is no way to get it back. Using finger print with PIN or password will be safer. If
somebody steals your finger print he will also need your pin or password.
• Biometric techniques have been quite successful in the
past few years. There are many advantages of this
system. But there are also some disadvantages.
Organizations need to think before implementing a
biometric solution. These are not just for everyone. One
day biometric techniques will become an important part
of our daily lives.
• Biometric Authentication: A Review by Debnath
Bhattacharyya1, Rahul Ranjan1, Farkhod Alisherov A.2, and
Minkyu Choi3
• Biometrics Authentication Techniques in ATM By 1Sandeep S.
Majge and 2Hanmant W. Kulkarni

More Related Content

What's hot

Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Onlines-mueller
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 

What's hot (20)

Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 

Viewers also liked

Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93Nithin V A
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Rockwell Collins | ARINC airports
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS Animetrics
 

Viewers also liked (20)

Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Retina scan
Retina scanRetina scan
Retina scan
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 

Similar to Biometric security tech

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdfVamshiKaram
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access controlArsalan Mohammad
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 

Similar to Biometric security tech (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Seminar
SeminarSeminar
Seminar
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 

More from mmubashirkhan

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network securitymmubashirkhan
 
Security threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkSecurity threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkmmubashirkhan
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnmmubashirkhan
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns mmubashirkhan
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecturemmubashirkhan
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypotmmubashirkhan
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cnsmmubashirkhan
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issuesmmubashirkhan
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manetmmubashirkhan
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 

More from mmubashirkhan (11)

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
 
Security threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g networkSecurity threats and countermeasure in 3 g network
Security threats and countermeasure in 3 g network
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Security in wireless la ns
Security in wireless la ns Security in wireless la ns
Security in wireless la ns
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
 
Cyber security issues
Cyber security issuesCyber security issues
Cyber security issues
 
Authentication in manet
Authentication in manetAuthentication in manet
Authentication in manet
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

Biometric security tech

  • 1.
  • 2. • Biometrics is the measurement and analysis of a person’s measurable personal traits or characteristics. • After measurement, this information can be used to authenticate a person. This can also be used for other type of measurements. • The authentication system authenticates your identity and verifies if you are the person you say you are. It, according to the result, allows or denies access to the system.
  • 3. • To make sure that a person is who he says he is, we take a sample of the physical structure of the person and compare it with the sample or record present in our database. • Before comparison, a sign-up process is done, where a person gives his biometric sample that is used later to compare and authenticate a user, at the time of authentication. • The sample at the time of sign-up is saved into the database of the system. When the given sample matches the samples existing in the database, user is authenticated and access is given. And when the given sample does not match the existing record the user is denied access to the system. This process usually takes 2-3 seconds.
  • 4. • In modern approach, Biometric characteristics can be divided in two main classes: – Physiological are related to the shape of the body and thus it varies from person to person Fingerprints, Face recognition, hand geometry and iris recognition are some examples of this type of Biometric. – Behavioural are related to the behavior of a person. Some examples in this case are signature, keystroke dynamics and of voice . Sometimes voice is also considered to be a physiological biometric as it varies from person to person.
  • 5.
  • 6. • Connect an apparatus to the computer and it scans the finger of a person and authenticates identity of an individual. If it authenticates the person, it will give the person the access to enter the system. And if it doesn’t authenticate, you are not given access to the system. Fingerprints vary from person to person. • The have some special characteristics that make them different from the finger print of other person. The fingerprints of a person remain unchanged throughout life, except in case of some injury or damage. • Fingerprint scanning can be done in a number of ways. There are some systems that scan the distinct patterns on finger. • Fingerprint systems should be cleaned regularly as dust may affect the reading and the system may not be able to authenticate the user.
  • 7. • The eye contains a certain structure surrounding the pupil which is known as iris. • Iris varies from person to person and two irises can never be identical. • Even the left and right eye irises are different from each other. Here the user is asked to stand couple of inches of inches away from the iris scanner, keeping eye in a certain position • Iris Scan is a bigger and expensive system, but is very accurate.
  • 8. • Hand geometry is basically the analysis and measuring of both hands and fingers. The user is required to place its hand at the hand-scanner with the fingers in proper position as they were at the time of sign-up. A 32 thousand pixel digital camera is used to measure the thickness, length and width of the hands and fingers. There are many different types of hand devices available in the market.
  • 9. • Facial scan is done using the specific characteristics of a human’s face. • A camera is used to capture the features of a person. It doesn’t compare the whole face’s data with the whole face. Instead compares it from certain parts of the face to the person’s face during the scan. • Only parts like upper outlines of the eye socket or sides of mouth are matched because these parts are difficult to change with plastic surgery. So it doesn’t matter if the person loses little weight. This technology works great at 320x240 resolutions and 3, 5 frames per second.
  • 10.
  • 11. • The voices of people vary from one to another. This fact was used when devising voice scan technology. The voice of a user is recorded using a microphone reading device. And the system is able to recognize the voice later because of the special characteristics of human voice. It is important that the circumstances at the time of recording and authenticating are same. Things like background noise and equipment’s quality might influence the system. The best part of using this technique is that it requires no expensive equipment.
  • 12. • This technique uses a special pen and tablet to capture the way user signs its name. As much as the signature is important there are other features that are considered important. It measures when a user’s put the pen on the tablet and when he removes it, the pressure on the table, the speed by which he signs etc. This technique is considered to be very accurate. And by using this technique less people will object to this type of authentication.
  • 13. • Biometrics is an emerging technology. Less number of people must have used security systems that combine with biometrics techniques. This is because there is very little number of vendors that manufacture these specialized products. And so the prices are very high too. But as more people will get aware of these techniques, the prices will definitely come down. As user acceptance increases, more people will use these techniques in their everyday lives. • Access control • Identity verification • Law enforcement
  • 14. • User acceptability – User acceptability is one of the major issues faced by biometrics for various reasons. Most of the people think that biometric techniques are an intrusion to their personal life. They are concerned that in what ways this information can be used in the future. It might be possible that government keeps track of such information without the users consent. Some might get medical information from these samples. Iris and retina scans may indicate use of drugs. It is certainly not the purpose of the systems detecting information. But the information might fall in wrong hands. There is a possibility that certain contagious diseases might spread if everybody use the same scanner. • Technical problems – Cost and accuracy are two major technical problems. In most of the cases, we will need new hardware, software etc. to use a biometric technique. Cost depends on the type of technique we are using. Iris scanner is a lot more expensive than finger print scanner. Finger print scanners are very affordable. With time these techniques will become cheaper and more efficient. • Intrinsic problems – Any trait can be stolen. Voices may be recorded and used anywhere. Once the biometrics is stolen there is no way to get it back. Using finger print with PIN or password will be safer. If somebody steals your finger print he will also need your pin or password.
  • 15. • Biometric techniques have been quite successful in the past few years. There are many advantages of this system. But there are also some disadvantages. Organizations need to think before implementing a biometric solution. These are not just for everyone. One day biometric techniques will become an important part of our daily lives.
  • 16. • Biometric Authentication: A Review by Debnath Bhattacharyya1, Rahul Ranjan1, Farkhod Alisherov A.2, and Minkyu Choi3 • Biometrics Authentication Techniques in ATM By 1Sandeep S. Majge and 2Hanmant W. Kulkarni